Momentum - Business to Business Online Magazine Summer 2017 Issue | Page 31

Business By: Becky Sill, CIPA Independent LegalShield Associate www.beckysill.com Identity Protection Framework Part III IDENTITY THEFT SCHEMES A fake driver’s license at one time was used to get into bars and have a good time, but today a fake ID has a whole new meaning. Awareness can go a long way to protect you from some common ways that identity thieves are getting and using our information. Physical Theft – Physically taking someone’s information. i.e. Stealing items from a home, office, luggage, wallet, purse, etc. for fraudulent purposes. Spam – Unwanted email you receive intended to accomplish specific goals. i.e. clicking on a link to download a program to access data on your computer (see spyware). These emails should not be clicked on and should be deleted as well as removed from the trash folder. Pretexting – Also called spoofing, impersonating, masquerading or mimicking – A spam email sent to appear as though it is from a trusted source, such as someone you do business with, so they can extract the desired information for committing fraud. Phishing - Emails that are sent “fishing” for information. These appear to be from legitimate companies or people requesting personal information while sometimes using scare tactics such as “click this link to verify your information or your account will be frozen”. The IRS, banking institutions, etc. will NEVER ask for this type of information through an email. If you question the validity of an email, call the trusted company directly using a known phone number to verify before sending any information. Another phishing scheme alive and well is posing as a corporate figure, such as the CEO, requesting personal information for all employees. If an email has a request that does not match up with day to day operations, be sure to initiate verbal contact with the sender to validate the request. Skimming – Card skimmers are devices that are used to pull data off a credit or debit card and used to produce counterfeit cards. These may be found at an ATM, gas station pump or other point of sale device. Skimmers can be portable and used to skim credit card information in public areas. For a FREE credit card sleeve with RFID blocking technology, please contact me. Shoulder Surfing – A casual fraud scheme where someone is looking over your shoulder to access data such as a pin number, driver’s license or credit card information. Be alert! Cover the key pad when entering your pin number. With phone cameras, it makes this form of identity theft very easy with an unsuspecting victim. Piggybacking – An illegal act of following someone into a restricted area without authorization. Be aware if you have security clearance to keep the area secure. Spyware (key loggers) – Software that can be downloaded to a computer, from one of these other schemes, to log keystrokes and take screen shots of confidential information. Don’t live in fear. Be aware. Take precautions. Mitigate your risks and enjoy your summer! Source: Identity Management Institute MOMENTUM / Summer 2017 31